]>
Commit | Line | Data |
---|---|---|
51ea22b0 MK |
1 | // SPDX-License-Identifier: GPL-2.0-only |
2 | ||
3 | #include "netlink.h" | |
4 | #include "common.h" | |
5 | #include "bitset.h" | |
6 | ||
7 | struct wol_req_info { | |
8 | struct ethnl_req_info base; | |
9 | }; | |
10 | ||
11 | struct wol_reply_data { | |
12 | struct ethnl_reply_data base; | |
13 | struct ethtool_wolinfo wol; | |
14 | bool show_sopass; | |
15 | }; | |
16 | ||
17 | #define WOL_REPDATA(__reply_base) \ | |
18 | container_of(__reply_base, struct wol_reply_data, base) | |
19 | ||
ff419afa | 20 | const struct nla_policy ethnl_wol_get_policy[] = { |
329d9c33 JK |
21 | [ETHTOOL_A_WOL_HEADER] = |
22 | NLA_POLICY_NESTED(ethnl_header_policy), | |
51ea22b0 MK |
23 | }; |
24 | ||
25 | static int wol_prepare_data(const struct ethnl_req_info *req_base, | |
26 | struct ethnl_reply_data *reply_base, | |
27 | struct genl_info *info) | |
28 | { | |
29 | struct wol_reply_data *data = WOL_REPDATA(reply_base); | |
30 | struct net_device *dev = reply_base->dev; | |
31 | int ret; | |
32 | ||
33 | if (!dev->ethtool_ops->get_wol) | |
34 | return -EOPNOTSUPP; | |
35 | ||
36 | ret = ethnl_ops_begin(dev); | |
37 | if (ret < 0) | |
38 | return ret; | |
39 | dev->ethtool_ops->get_wol(dev, &data->wol); | |
40 | ethnl_ops_complete(dev); | |
67bffa79 MK |
41 | /* do not include password in notifications */ |
42 | data->show_sopass = info && (data->wol.supported & WAKE_MAGICSECURE); | |
51ea22b0 MK |
43 | |
44 | return 0; | |
45 | } | |
46 | ||
47 | static int wol_reply_size(const struct ethnl_req_info *req_base, | |
48 | const struct ethnl_reply_data *reply_base) | |
49 | { | |
50 | bool compact = req_base->flags & ETHTOOL_FLAG_COMPACT_BITSETS; | |
51 | const struct wol_reply_data *data = WOL_REPDATA(reply_base); | |
52 | int len; | |
53 | ||
54 | len = ethnl_bitset32_size(&data->wol.wolopts, &data->wol.supported, | |
55 | WOL_MODE_COUNT, wol_mode_names, compact); | |
56 | if (len < 0) | |
57 | return len; | |
58 | if (data->show_sopass) | |
59 | len += nla_total_size(sizeof(data->wol.sopass)); | |
60 | ||
61 | return len; | |
62 | } | |
63 | ||
64 | static int wol_fill_reply(struct sk_buff *skb, | |
65 | const struct ethnl_req_info *req_base, | |
66 | const struct ethnl_reply_data *reply_base) | |
67 | { | |
68 | bool compact = req_base->flags & ETHTOOL_FLAG_COMPACT_BITSETS; | |
69 | const struct wol_reply_data *data = WOL_REPDATA(reply_base); | |
70 | int ret; | |
71 | ||
72 | ret = ethnl_put_bitset32(skb, ETHTOOL_A_WOL_MODES, &data->wol.wolopts, | |
73 | &data->wol.supported, WOL_MODE_COUNT, | |
74 | wol_mode_names, compact); | |
75 | if (ret < 0) | |
76 | return ret; | |
77 | if (data->show_sopass && | |
78 | nla_put(skb, ETHTOOL_A_WOL_SOPASS, sizeof(data->wol.sopass), | |
79 | data->wol.sopass)) | |
80 | return -EMSGSIZE; | |
81 | ||
82 | return 0; | |
83 | } | |
84 | ||
85 | const struct ethnl_request_ops ethnl_wol_request_ops = { | |
86 | .request_cmd = ETHTOOL_MSG_WOL_GET, | |
87 | .reply_cmd = ETHTOOL_MSG_WOL_GET_REPLY, | |
88 | .hdr_attr = ETHTOOL_A_WOL_HEADER, | |
51ea22b0 MK |
89 | .req_info_size = sizeof(struct wol_req_info), |
90 | .reply_data_size = sizeof(struct wol_reply_data), | |
51ea22b0 MK |
91 | |
92 | .prepare_data = wol_prepare_data, | |
93 | .reply_size = wol_reply_size, | |
94 | .fill_reply = wol_fill_reply, | |
95 | }; | |
8d425b19 MK |
96 | |
97 | /* WOL_SET */ | |
98 | ||
ff419afa | 99 | const struct nla_policy ethnl_wol_set_policy[] = { |
329d9c33 JK |
100 | [ETHTOOL_A_WOL_HEADER] = |
101 | NLA_POLICY_NESTED(ethnl_header_policy), | |
8d425b19 MK |
102 | [ETHTOOL_A_WOL_MODES] = { .type = NLA_NESTED }, |
103 | [ETHTOOL_A_WOL_SOPASS] = { .type = NLA_BINARY, | |
104 | .len = SOPASS_MAX }, | |
105 | }; | |
106 | ||
107 | int ethnl_set_wol(struct sk_buff *skb, struct genl_info *info) | |
108 | { | |
109 | struct ethtool_wolinfo wol = { .cmd = ETHTOOL_GWOL }; | |
8d425b19 | 110 | struct ethnl_req_info req_info = {}; |
5028588b | 111 | struct nlattr **tb = info->attrs; |
8d425b19 MK |
112 | struct net_device *dev; |
113 | bool mod = false; | |
114 | int ret; | |
115 | ||
98130546 MK |
116 | ret = ethnl_parse_header_dev_get(&req_info, tb[ETHTOOL_A_WOL_HEADER], |
117 | genl_info_net(info), info->extack, | |
118 | true); | |
8d425b19 MK |
119 | if (ret < 0) |
120 | return ret; | |
121 | dev = req_info.dev; | |
2f599ec4 | 122 | ret = -EOPNOTSUPP; |
8d425b19 | 123 | if (!dev->ethtool_ops->get_wol || !dev->ethtool_ops->set_wol) |
2f599ec4 | 124 | goto out_dev; |
8d425b19 MK |
125 | |
126 | rtnl_lock(); | |
127 | ret = ethnl_ops_begin(dev); | |
128 | if (ret < 0) | |
129 | goto out_rtnl; | |
130 | ||
131 | dev->ethtool_ops->get_wol(dev, &wol); | |
132 | ret = ethnl_update_bitset32(&wol.wolopts, WOL_MODE_COUNT, | |
133 | tb[ETHTOOL_A_WOL_MODES], wol_mode_names, | |
134 | info->extack, &mod); | |
135 | if (ret < 0) | |
136 | goto out_ops; | |
137 | if (wol.wolopts & ~wol.supported) { | |
138 | NL_SET_ERR_MSG_ATTR(info->extack, tb[ETHTOOL_A_WOL_MODES], | |
139 | "cannot enable unsupported WoL mode"); | |
140 | ret = -EINVAL; | |
141 | goto out_ops; | |
142 | } | |
143 | if (tb[ETHTOOL_A_WOL_SOPASS]) { | |
144 | if (!(wol.supported & WAKE_MAGICSECURE)) { | |
145 | NL_SET_ERR_MSG_ATTR(info->extack, | |
146 | tb[ETHTOOL_A_WOL_SOPASS], | |
147 | "magicsecure not supported, cannot set password"); | |
148 | ret = -EINVAL; | |
149 | goto out_ops; | |
150 | } | |
151 | ethnl_update_binary(wol.sopass, sizeof(wol.sopass), | |
152 | tb[ETHTOOL_A_WOL_SOPASS], &mod); | |
153 | } | |
154 | ||
155 | if (!mod) | |
156 | goto out_ops; | |
157 | ret = dev->ethtool_ops->set_wol(dev, &wol); | |
158 | if (ret) | |
159 | goto out_ops; | |
160 | dev->wol_enabled = !!wol.wolopts; | |
67bffa79 | 161 | ethtool_notify(dev, ETHTOOL_MSG_WOL_NTF, NULL); |
8d425b19 MK |
162 | |
163 | out_ops: | |
164 | ethnl_ops_complete(dev); | |
165 | out_rtnl: | |
166 | rtnl_unlock(); | |
2f599ec4 | 167 | out_dev: |
8d425b19 MK |
168 | dev_put(dev); |
169 | return ret; | |
170 | } |